Office Décor with a Message 

Active involvement of staff is essential to implementing effective information security in any workplace. The Information Security Poster Pack from IT...

Selecting A Data-Wiping Utility 

By Henrik Andersen

In today's corporate environment, almost 98 percent of intellectual property is stored electronically, and data security is a vital factor from acquisition...

Intangible Assets 

By Sandra Kay Miller

Electronics, tools, vehicles and even office furniture can easily be inventoried and tracked. But today, a company's most valuable assets cannot be tagged,...

2008 ASIS Conference Brings Specialized Sessions To Attendees 

Several sessions related to attacks of intelligence or physical nature will be among the offerings at ASIS International 2008, the 54th annual seminar and exhibit taking place on Sept. 15-18 in Atlanta. ...

Risky Online Behavior More Likely To Happen In Small Businesses 

Trend Micro Inc., a developer of Internet content security, reports that in the U.S., U.K., Germany and Japan, employees in small companies took more online risks while on the company network compared to their counterparts in larger organizations, according to the results of a study that explores corporate computer users' perceptions of and experiences with security threats....

Study Finds One In Five Businesses Lacks Continuity Plan 

Despite the man-made and natural disasters that are a reality today, many businesses are not fully prepared to maintain their business operations in the event of an emergency, according to an annual AT&T Inc. study on business continuity and disaster recovery preparedness for U.S. businesses in the private sector....

BEWARE OF Strangers with Candy 

Information security organization Infosecurity Europe conducts an annual survey that questions office workers on what they would give up (passwords, personal...

Getting Management On Board 

By Paul C. Boucherle

Editor's Note: Welcome to our new monthly column that will translate the issues of convergence into everyday, practical terms. Our goal is to provide...

The More Things Change 

By Sandra Kay Miller

In contrast to the younger practitioners who dominate the computer, networking and information security industry, Fred Avolio was cutting his teeth on...

Be Aware Of Emerging Issues 

By Bob Hayes, Kathleen Kotwica and Marleah Blades

EDITOR'S NOTE: There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base...

Survey Finds Range Of Information Security Threats 

Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals....

Safety Seminar Teachers Work, School Violence Prevention 

An estimated 2 million Americans will be affected by workplace violence this year, according to the federal Occupational Health and Safety Administration. ...

2008 ASIS Conference Brings Specialized Sessions To Attendees 

ASIS International 2008 will offer several sessions related to convergence....

The Next Level of Convergence 

By Michael Fickes

The ubiquitous industry buzzword has another meaning for security professionals at many top companies: converging security with business interests to create strategies to add value to the bottom line...

Open Up The Dialogue 

Building contractors and specifiers have unique perspectives and valuable positions in building design and in selecting a security system. Working with...

Moving Up The Stack 

By Sandra Kay Miller

As networks, both public and private, have become more integral to everyday life, the lines between public and private continue to dissolve. Users connect...

New Skill For The New Millennium 

Bob Hayes

EDITOR'S NOTE: There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base...

Are IT Security Budgets Recession-Proof? 

IT security budgets remain stable despite an impending economic recession, according to a survey conducted at the recent RSA Conference in San Francisco by Astaro Corp., a vendor of integrated security appliances. ...

Why Security Professionals Need Executive Leadership Skills 

By Bob Hayes, Kathleen Kotwica and Marleah Blades

EDITOR'S NOTE: There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base...

Honeywell Study: Organizations Moving To Convergence 

Honeywell has released survey results that reveal how some organizations are integrating physical security measures such as video surveillance and access control with traditional IT security systems....

Picking and Choosing Biometrics 

By MICHAEL FICKES

All of a sudden, everyone is getting biometric access control. The federal government is installing systems in offices across the United States. Federal...

Be Smart Around Suspicious Objects 

When you discover a suspicious object in the workplace, there are a few guidelines to follow, according to The Encyclopedia of Security Management by...

What's Next For IP Video 

The new direction for video surveillance systems has offered challenges to the industry's suppliers as well as for end-users. One of the industry's biggest...

From The Field 

EDUCATION California's Shasta Union High School District Reduces Theft and Vandalism With IP Video With recent incidents ranging from fights and vandalism...

Five Ways To Protect Your Data 

BY TIM RHODES

We lock our businesses, our homes and our cars to restrict wrongful entry and burglary. We invest heavily in security systems to deter and prevent loss....

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | Next

Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top